Analysis
-
max time kernel
94s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/01/2024, 01:42
Static task
static1
Behavioral task
behavioral1
Sample
760d23b3faaa09c480f5ece99a58ce49.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
760d23b3faaa09c480f5ece99a58ce49.dll
Resource
win10v2004-20231215-en
General
-
Target
760d23b3faaa09c480f5ece99a58ce49.dll
-
Size
112KB
-
MD5
760d23b3faaa09c480f5ece99a58ce49
-
SHA1
c420b0d0a51e56cac4fbb24d3f4fb23c31b1abe0
-
SHA256
4fb0a3bc69e28cbb418020d609344d3df117202b1add4db63e00802cc1b8be2d
-
SHA512
80a0c05ac2b86db3853defe887a8d5a2769b41c28357afa4fbbe9f0145ac77fab1271ab174c3c8c3ae03d51204a27763b007858e8dcc66aa9ae036b4fc345cd7
-
SSDEEP
1536:iko0WXKFhaCcArPH+uuZkMsIwS9B/3NRVjT07puERGV9Uzk+ORs0P0D:iR0WX6ha/oPHXuZz9FT07pZG3UERDE
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\DefaultPrinter = "{4388f5ef-78ad-41b6-afb6-1df493c3acc3}" regsvr32.exe -
Loads dropped DLL 2 IoCs
pid Process 1688 regsvr32.exe 1688 regsvr32.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\Default\DefaultPrinter.dll regsvr32.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4388f5ef-78ad-41b6-afb6-1df493c3acc3} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4388f5ef-78ad-41b6-afb6-1df493c3acc3}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4388f5ef-78ad-41b6-afb6-1df493c3acc3}\InprocServer32\ = "C:\\Program Files (x86)\\Common Files\\Default\\DefaultPrinter.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4388f5ef-78ad-41b6-afb6-1df493c3acc3}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1688 regsvr32.exe 1688 regsvr32.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 1688 regsvr32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1688 regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1740 wrote to memory of 1688 1740 regsvr32.exe 86 PID 1740 wrote to memory of 1688 1740 regsvr32.exe 86 PID 1740 wrote to memory of 1688 1740 regsvr32.exe 86
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\760d23b3faaa09c480f5ece99a58ce49.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\760d23b3faaa09c480f5ece99a58ce49.dll2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1688
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
112KB
MD5760d23b3faaa09c480f5ece99a58ce49
SHA1c420b0d0a51e56cac4fbb24d3f4fb23c31b1abe0
SHA2564fb0a3bc69e28cbb418020d609344d3df117202b1add4db63e00802cc1b8be2d
SHA51280a0c05ac2b86db3853defe887a8d5a2769b41c28357afa4fbbe9f0145ac77fab1271ab174c3c8c3ae03d51204a27763b007858e8dcc66aa9ae036b4fc345cd7